shielding data in use is crucial as it truly is vulnerable to data breaches and third-party access. Also, if hackers intercept and compromise the data, they are able to access both data at relaxation and data in https://social-galaxy.com/story3424076/detailed-notes-on-confidential-computing-enclave